Computer Science

1

Data Management as a Critical Component of Protecting Corporate Devices

Publication date: September 2024
Authors: Melikov Agassi,  Gasimov Vagif,  Ahmadov Samur

Abstract

The relevance of the problem under study lies in the growing threat of cyberattacks and unauthorized access to corporate data. The need for effective data management at the moment is due to the increased importance of securing corporate devices, which requires in-depth analysis and understanding of the role of data management in this context. The aim of the study is to comprehensively analyze the role of information governance in securing organizational technology. The used methods were: experiment, systematization, comparison, analysis, synthesis. The main findings of the study emphasize the importance of information management in securing enterprise technology. The study involves the development of a C++ program designed to simulate different scenarios of using data management strategies. This program is designed to demonstrate the effectiveness of different information security techniques in organizational technologies. In addition, a comparative analysis of data control techniques designed to protect organizational devices has been carried out. The results of this analysis are presented in the form of a table that discusses the various aspects of information management in this context. And the developed structural diagram of information management in organizations presents the main components and processes required to secure organizational technology. The paper also provides examples of practical applications of data control techniques in large corporations, emphasizing their importance in protecting sensitive information. This research makes a practical contribution by providing organizations not only with theoretical foundations but also with concrete data governance strategies to enhance the security of corporate devices, which is essential for today’s companies in the face of growing cyber threats. Limitations of the study include biases, simulated situations, and an inability to adequately address issues that arise in the actual world, such as organizational culture and cyber threats. © Authors.

Author keywords:Commercial Equipment Security; Cybersecurity of Technology Assets; Information Control; Information Governance; Information Security Integration

Queueing-inventory: analytical and simulation modeling and classical and retrial queues and inventory

Publication date: September 2024
Authors:Krishnamoorthy Achyutha,  Chakravarthy Srinivas R.,  Melikov, Agassi,  Narayanan, Viswanath C.

Abstract

This is the PREFACE to the Special Issue “Queueing-inventory: analytical and simulation modeling and classical and retrial queues and inventory”. The year 2022 was the 30th anniversary of Queueing-inventory. It was in that connection that the guest editors requested Professor Endre Boros, the Editor-in-Chief of Annals of Operations Research, for permission to guest edit a special issue. This was granted by the Editorial Board of the journal. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.

Author keywords: Analytical and simulation modeling; Classical inventory; Classical queue; Queueing-inventory; Retrial inventory; Retrial queue

Queuing-Inventory System with Catastrophes in the Warehouse: Case of Rare Catastrophes

Publication date: March 2024
Authors:Melikov, Agassi,  Poladova, Laman,  Sztrik, Janos

Abstract

A model of a single-server queuing-inventory system (QIS) with a limited waiting buffer for consumer customers (c-customers) and catastrophes has been developed. When a catastrophe occurs, all items in the system’s warehouse are destroyed, but c-customers in the system are still waiting for replenishment. In addition to c-customers, negative customers (n-customers) are also taken into account, each of which displaces one c-customer (if any). The policy (s, S) is used to replenish stocks. If, when a customer enters, the system warehouse is empty, then, according to Bernoulli’s trials, this customer either leaves the system without goods or joins the buffer. The mathematical model of the investigated QIS is constructed in the form of a continuous-time Markov chain (CTMC). Both exact and approximate methods for calculating the steady-state probabilities of constructed CTMCs are proposed and closed-form expressions are obtained for calculating the performance measures. Numerical evaluations are presented, demonstrating the high accuracy of the developed approximate formulas, as well as the behavior of performance measures depending on the input parameters. In addition, an optimization problem is solved to obtain the optimal value of the reorder point to minimize the expected total cost. © 2024 by the authors.

Author keywords: calculation algorithm; catastrophes; finite waiting room; queuing-inventory system; space merging method; steady-state probabilities